组件或系统信息启用检测,维修或接种,例如:1。组件状态和/或行为的低分辨率颗粒信号2。历史告知过去已知的本地和全球善良国家3。数据,攻击者和/或通过网络杀伤链所使用的漏洞使用攻击者使用的唯一价值取证数据(例如,说明了相关的独特属性)和不可变化的属性)和不可变化的(例如,数据的含义在已知的时间范围内都不会在已知的时间范围内变化)对所有量的关键组成部分的覆盖范围,从而使量不多(两者)均可构成量不多(两者)。 零值 - 每个组件都在监视其同龄人以检测,修复和接种证明证据或证明某物的证据,而不是在Python上写下的红色C模型软件,用于在各种实验条件下重播/模拟红色C数据集和总线消息(例如,在各种实验条件下(例如,计算约束,bass band basswids Confects,bass band basswidths约束),定时,定时, enabling algorithm development Red- C Compliant Firmware with the functionality of either TA1 and/or TA2, which is interoperable with all other Red- C compliant firmware Open-Source Publish to the internet with a license that does not restrict commercial or academic use by other parties (e.g., the MIT License) in two or more locations (i.e., Test and Evaluation Team website and another code repository e.g., GitHub) Detection Identification of网络攻击和受影响的组件维修系统和/或组件的全球和局部状态变化确保系统处于有效状态攻击者和/或通过网络杀伤链所使用的漏洞使用攻击者使用的唯一价值取证数据(例如,说明了相关的独特属性)和不可变化的属性)和不可变化的(例如,数据的含义在已知的时间范围内都不会在已知的时间范围内变化)对所有量的关键组成部分的覆盖范围,从而使量不多(两者)均可构成量不多(两者)。零值 - 每个组件都在监视其同龄人以检测,修复和接种证明证据或证明某物的证据,而不是在Python上写下的红色C模型软件,用于在各种实验条件下重播/模拟红色C数据集和总线消息(例如,在各种实验条件下(例如,计算约束,bass band basswids Confects,bass band basswidths约束),定时,定时, enabling algorithm development Red- C Compliant Firmware with the functionality of either TA1 and/or TA2, which is interoperable with all other Red- C compliant firmware Open-Source Publish to the internet with a license that does not restrict commercial or academic use by other parties (e.g., the MIT License) in two or more locations (i.e., Test and Evaluation Team website and another code repository e.g., GitHub) Detection Identification of网络攻击和受影响的组件维修系统和/或组件的全球和局部状态变化确保系统处于有效状态enabling algorithm development Red- C Compliant Firmware with the functionality of either TA1 and/or TA2, which is interoperable with all other Red- C compliant firmware Open-Source Publish to the internet with a license that does not restrict commercial or academic use by other parties (e.g., the MIT License) in two or more locations (i.e., Test and Evaluation Team website and another code repository e.g., GitHub) Detection Identification of网络攻击和受影响的组件维修系统和/或组件的全球和局部状态变化确保系统处于有效状态
新兴和颠覆性技术继续受到技术专家、军事战略家、运营商、规划人员、预算人员和政策制定者的极大关注。美国国防部开始强调“威胁知情、概念驱动、能力发展”。这一构想涵盖了三个主要的努力方向,但并未完全考虑新兴技术的作用和影响。本文介绍并讨论了一些评估新兴和颠覆性技术军事影响的关键框架,包括技术成熟、军事效用、催化剂的使用、军事创新和适应过程、抵消战略和作战概念等阶段。讨论了多组分和多层次分析框架 - 杀伤链和任务工程。除了技术之外,相应的努力还必须考虑过渡和采用的过程、分析层级之间的联系、需求与概念、技术、采购和规划、编程、预算和执行 (PPBE) 之间的增强交互以及相关的组织设计。随着用户对新兴和颠覆性技术的认识和理解不断加深,他们必须为现有和其他替代作战概念的实验、实施和发展做出相应的努力。尽管术语和构成各不相同,但几乎所有当代作战概念都具有相同的基本目标 - 试图在 21 世纪以机器速度有效地进行联合作战。技术情报的进步也必须继续发展。尽管人们对“黑天鹅”事件或“技术惊喜”存在普遍的担忧和声明,但对于新兴和颠覆性技术而言,惊喜只会发生在那些不注意的人身上。军事运筹学与分析 (ORA) 社区可以充当利益相关者之间的重要桥梁,并评估这些不同技术的军事效用以及如何最好地利用它们来获得战略、作战和战术优势。
目录 第一章:简介................................................................................................................ 1 JSOW Block Three 目标集................................................................................................................... 2 时间关键型目标确定和杀伤链考虑因素................................................................................................... 3 JSOW Block Three 任务需求定义............................................................................................................. 5 分析范围和局限性.................................................................................................................................... 9 第二章:JSOW Block Three 假设.................................................................................................... 11 背景.................................................................................................................................................... 11 目标位置误差和武器圆概率误差 (CEP) 讨论.................................................................................................... 13 传感器假设.................................................................................................................................................... 18 飞机假设.................................................................................................................................................... 21 数据链假设.................................................................................................................................................... 25 总结.................................................................................................................................................................... 26 第三章:JSOW Block Three 要求的制定..................................................................................................... 27 简介..................................................................................................................................................... 27 作战概念发展................................................................................................................ 28 能力和杀伤链实施................................................................................................................... 32 其他要求................................................................................................................................... 35 通用武器模型............................................................................................................................ 36 第四章:替代方案的开发和分析......................................................................................................... 38 简介......................................................................................................................................................... 38 导引头替代方案.................................................................................................................................... 38 数据链替代方案.................................................................................................................................... 47 F/A-18 超级大黄蜂数据链能力............................................................................................................................................................. 47 武器数据链波形替代方案 ...................................................................................................... 54 背景 .............................................................................................................................. 54 JSOW Block Three 数据链替代方案 .............................................................................. 56 武器数据链网络 (WDLN) 实施替代方案 ............................................................................. 62 武器数据链硬件替代方案 ............................................................................................. 63 双向数据链注意事项 ............................................................................................. 68 数据链安全性注意事项 ............................................................................................. 69 制导电子单元替代方案 ............................................................................................................. 71 任务规划替代方案 ............................................................................................................................. 72 替代方案分析摘要 ............................................................................................................................. 74 建议设计摘要 ............................................................................................................................. 77 关键技术计划 ............................................................................................................................. 78 第五章:JSOW Block Three 实施 ............................................................................. 81 F/A-18 飞行员座舱车辆接口设计 ............................................................................................. 81 开发和测试时间线……................................................................................................................ 88 JSOW Block Three 演示阶段 ...................................................................................................... 90 演示 1:反水面作战 (ASuW) .............................................................................................. 90 SIMEX:第三方目标瞄准演示 ............................................................................................. 91 演示 2:............................................................................................................................. 92 其他演示 ............................................................................................................................. 9256 武器数据链网络 (WDLN) 实施替代方案................................................................................. 62 武器数据链硬件替代方案.................................................................................................... 63 双向数据链注意事项.................................................................................................... 68 数据链安全性注意事项.................................................................................................... 69 制导电子单元替代方案....................................................................................................... 71 任务规划替代方案....................................................................................................................... 72 替代方案分析摘要.................................................................................................................... 74 推荐设计摘要.................................................................................................................................... 77 关键技术计划.................................................................................................................................... 78 第五章:JSOW Block Three 实施............................................................................. 81 F/A-18 飞行员座舱车辆接口设计............................................................................................. 81 开发和测试时间表...................................................................................................................... 88 JSOW Block Three 演示阶段..................................................................................................... 90 演示 1:反水面作战 (ASuW)............................................................................................. 90 SIMEX:第三方定位演示 ...................................................................................................... 91 演示 2:...................................................................................................................... 92 其他演示 ...................................................................................................................... 9256 武器数据链网络 (WDLN) 实施替代方案................................................................................. 62 武器数据链硬件替代方案.................................................................................................... 63 双向数据链注意事项.................................................................................................... 68 数据链安全性注意事项.................................................................................................... 69 制导电子单元替代方案....................................................................................................... 71 任务规划替代方案....................................................................................................................... 72 替代方案分析摘要.................................................................................................................... 74 推荐设计摘要.................................................................................................................................... 77 关键技术计划.................................................................................................................................... 78 第五章:JSOW Block Three 实施............................................................................. 81 F/A-18 飞行员座舱车辆接口设计............................................................................................. 81 开发和测试时间表...................................................................................................................... 88 JSOW Block Three 演示阶段..................................................................................................... 90 演示 1:反水面作战 (ASuW)............................................................................................. 90 SIMEX:第三方定位演示 ...................................................................................................... 91 演示 2:...................................................................................................................... 92 其他演示 ...................................................................................................................... 92................................................................................ 77 关键技术项目 ...................................................................................................................... 78 第五章:JSOW Block Three 实施 ........................................................ 81 F/A-18 飞行员座舱飞行器界面设计 ........................................................................................ 81 开发和测试时间表................................................................................................................... 88 JSOW Block Three 演示阶段 ...................................................................................................... 90 演示 1:反水面作战 (ASuW) ............................................................................................. 90 SIMEX:第三方目标演示 ............................................................................................. 91 演示 2:.................................................................................................................... 92 其他演示 ............................................................................................................................. 92................................................................................ 77 关键技术项目 ...................................................................................................................... 78 第五章:JSOW Block Three 实施 ........................................................ 81 F/A-18 飞行员座舱飞行器界面设计 ........................................................................................ 81 开发和测试时间表................................................................................................................... 88 JSOW Block Three 演示阶段 ...................................................................................................... 90 演示 1:反水面作战 (ASuW) ............................................................................................. 90 SIMEX:第三方目标演示 ............................................................................................. 91 演示 2:.................................................................................................................... 92 其他演示 ............................................................................................................................. 92